Vulnerability of Complex Networks under Approximate Longest Chain Attack Strategies

被引:2
|
作者
Hao, Yao-Hui [1 ,2 ]
Song, Jia-Liang [1 ]
Lin, Yi [1 ]
Han, Ji-Hong [1 ]
机构
[1] ZhengZhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
ANALYZE; MODEL;
D O I
10.1051/itmconf/20160701011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We proposed three approximate longest chain-attack strategies and studied the vulnerability of complex networks under these intentional attack strategies. Experimental results indicate that when random network and small-world network are under any one of the three chain-attacks, the larger the < k > is, the smaller the iterative step T is. However, scale-free network shows different characteristics: the larger the < k > is, the larger the T is. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different complex networks.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [21] Application of modal analysis in assessing attack vulnerability of complex networks
    Petreska, Irina
    Tomovski, Igor
    Gutierrez, Eugenio
    Kocarev, Ljupco
    Bono, Flavio
    Poljansek, Karmen
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (04) : 1008 - 1018
  • [22] Oscillations in Complex Communication Networks under Attack
    Xia, Yongxiang
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (06) : 799 - 809
  • [23] Oscillations in Complex Communication Networks under Attack
    Yongxiang Xia
    Circuits, Systems & Signal Processing, 2008, 27 : 799 - 809
  • [24] Robustness of Complex Networks under Attack and Repair
    Hu Bin
    Li Fang
    Zhou Hou-Shun
    CHINESE PHYSICS LETTERS, 2009, 26 (12)
  • [25] Vulnerability analysis of interdependent infrastructure systems under edge attack strategies
    Wang, Shuliang
    Hong, Liu
    Ouyang, Min
    Zhang, Jianhua
    Chen, Xueguang
    SAFETY SCIENCE, 2013, 51 (01) : 328 - 337
  • [26] Input node placement restricting the longest control chain in controllability of complex networks
    Alizadeh, Samie
    Posfai, Marton
    Ghasemi, Abdorasoul
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [27] The Invulnerability of Traffic Networks under New Attack Strategies
    Guo, Xin-Ling
    Lu, Zhe-Ming
    Li, Hui
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (10) : 2106 - 2112
  • [28] Input node placement restricting the longest control chain in controllability of complex networks
    Samie Alizadeh
    Márton Pósfai
    Abdorasoul Ghasemi
    Scientific Reports, 13
  • [29] Attack and Defense Strategies in Complex Networks Based on Game Theory
    Li, Yapeng
    Deng, Ye
    Xiao, Yu
    Wu, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2019, 32 (06) : 1630 - 1640
  • [30] Vulnerability of clustering under node failure in complex networks
    Kuhnle A.
    Nguyen N.P.
    Dinh T.N.
    Thai M.T.
    Social Network Analysis and Mining, 2017, 7 (1)